Остановите войну!
for scientists:
default search action
Nino Vincenzo Verde
- > Home > Persons > Nino Vincenzo Verde
Publications
- 2014
- [j7]Roberto Di Pietro, Stefano Guarino, Nino Vincenzo Verde, Josep Domingo-Ferrer:
Security in wireless ad-hoc networks - A survey. Comput. Commun. 51: 1-20 (2014) - 2013
- [j6]Roberto Di Pietro, Nino Vincenzo Verde:
Epidemic theory and data survivability in unattended wireless sensor networks: Models and gaps. Pervasive Mob. Comput. 9(4): 588-597 (2013) - [c12]Wafa Ben Jaballah, Mauro Conti, Roberto Di Pietro, Mohamed Mosbah, Nino Vincenzo Verde:
MASS: An efficient and secure broadcast authentication scheme for resource constrained devices. CRiSIS 2013: 1-6 - [c11]Roberto Di Pietro, Roberto Mandati, Nino Vincenzo Verde:
Track me if you can: Transparent obfuscation for Location based Services. WOWMOM 2013: 1-9 - 2012
- [j5]Alessandro Colantonio, Roberto Di Pietro, Nino Vincenzo Verde:
A business-driven decomposition methodology for role mining. Comput. Secur. 31(7): 844-855 (2012) - [j4]Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
Visual Role Mining: A Picture Is Worth a Thousand Roles. IEEE Trans. Knowl. Data Eng. 24(6): 1120-1133 (2012) - [c9]Roberto Di Pietro, Fabio Martinelli, Nino Vincenzo Verde:
Broadcast Authentication for Resource Constrained Devices: A Major Pitfall and Some Solutions. SRDS 2012: 213-218 - 2011
- [j3]Elisabetta Allegra, Roberto Di Pietro, Mauro La Noce, Valerio Ruocco, Nino Vincenzo Verde:
Cross-border co-operation and education in digital investigations: A European perspective. Digit. Investig. 8(2): 106-113 (2011) - [j2]Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
A new role mining framework to elicit business roles and to mitigate enterprise risk. Decis. Support Syst. 50(4): 715-731 (2011) - [c8]Roberto Di Pietro, Nino Vincenzo Verde:
Epidemic data survivability in unattended wireless sensor networks. WISEC 2011: 11-22 - [c7]Roberto Di Pietro, Nino Vincenzo Verde:
Introducing epidemic models for data survivability in Unattended Wireless Sensor Networks. WOWMOM 2011: 1-6 - 2010
- [j1]Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
Taming role mining complexity in RBAC. Comput. Secur. 29(5): 548-564 (2010) - [c6]Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
Evaluating the Risk of Adopting RBAC Roles. DBSec 2010: 303-310 - [c5]Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
ABBA: adaptive bicluster-based approach to impute missing values in binary matrices. SAC 2010: 1026-1033 - [c4]Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
Mining Business-Relevant RBAC States through Decomposition. SEC 2010: 19-30 - 2009
- [c3]Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
A formal framework to elicit roles with business meaning in RBAC systems. SACMAT 2009: 85-94 - [c2]Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
Mining Stable Roles in RBAC. SEC 2009: 259-269 - [c1]Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
A Probabilistic Bound on the Basic Role Mining Problem and Its Applications. SEC 2009: 376-386
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-09 00:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint